<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hands-on_Android_Forensics_using_ADB_%28en%29</id>
	<title>Hands-on Android Forensics using ADB (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hands-on_Android_Forensics_using_ADB_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Hands-on_Android_Forensics_using_ADB_(en)&amp;action=history"/>
	<updated>2026-04-27T04:23:38Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Hands-on_Android_Forensics_using_ADB_(en)&amp;diff=71193&amp;oldid=prev</id>
		<title>Unknown user: /* Case Example and Analysis Steps */</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Hands-on_Android_Forensics_using_ADB_(en)&amp;diff=71193&amp;oldid=prev"/>
		<updated>2024-10-29T22:56:02Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Case Example and Analysis Steps&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 22:56, 29 October 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l87&quot;&gt;Line 87:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 87:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;For example, you want to analyze an application suspected of being malware. The steps that can be taken:&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;For example, you want to analyze an application suspected of being malware. The steps that can be taken:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt; 1. &lt;/del&gt;&#039;&#039;&#039;Connect the device:&#039;&#039;&#039; Connect the Android device to the computer and ensure USB debugging is enabled.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* &lt;/ins&gt;&#039;&#039;&#039;Connect the device:&#039;&#039;&#039; Connect the Android device to the computer and ensure USB debugging is enabled.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt; 2. &lt;/del&gt;&#039;&#039;&#039;Extract the application:&#039;&#039;&#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* &lt;/ins&gt;&#039;&#039;&#039;Extract the application:&#039;&#039;&#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  adb pull /data/app/com.example.malware-1.apk .&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  adb pull /data/app/com.example.malware-1.apk .&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt; 3. &lt;/del&gt;&#039;&#039;&#039;Static analysis:&#039;&#039;&#039; Use decompilation tools like jadx to view the application&#039;s source code.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* &lt;/ins&gt;&#039;&#039;&#039;Static analysis:&#039;&#039;&#039; Use decompilation tools like jadx to view the application&#039;s source code.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt; 4. &lt;/del&gt;&#039;&#039;&#039;Dynamic analysis:&#039;&#039;&#039; Run the application on a virtual or physical device, then monitor its activity using logcat and network analysis tools.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* &lt;/ins&gt;&#039;&#039;&#039;Dynamic analysis:&#039;&#039;&#039; Run the application on a virtual or physical device, then monitor its activity using logcat and network analysis tools.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt; 5. &lt;/del&gt;&#039;&#039;&#039;Look for indicators of compromise:&#039;&#039;&#039; Note any unusual permissions, suspicious network connections, and abnormal application behavior.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* &lt;/ins&gt;&#039;&#039;&#039;Look for indicators of compromise:&#039;&#039;&#039; Note any unusual permissions, suspicious network connections, and abnormal application behavior.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt; 6. &lt;/del&gt;&#039;&#039;&#039;Malware analysis:&#039;&#039;&#039; Upload the APK to VirusTotal for an analysis report.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* &lt;/ins&gt;&#039;&#039;&#039;Malware analysis:&#039;&#039;&#039; Upload the APK to VirusTotal for an analysis report.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Notes:==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Notes:==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Hands-on_Android_Forensics_using_ADB_(en)&amp;diff=71029&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;Here’s the translation while retaining the wiki format:  ==Android Forensic Techniques on Ubuntu Using ADB==  &#039;&#039;&#039;What is ADB?&#039;&#039;&#039;  Android Debug Bridge (ADB) is a powerful co...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Hands-on_Android_Forensics_using_ADB_(en)&amp;diff=71029&amp;oldid=prev"/>
		<updated>2024-10-20T22:18:47Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Here’s the translation while retaining the wiki format:  ==Android Forensic Techniques on Ubuntu Using ADB==  &amp;#039;&amp;#039;&amp;#039;What is ADB?&amp;#039;&amp;#039;&amp;#039;  Android Debug Bridge (ADB) is a powerful co...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Here’s the translation while retaining the wiki format:&lt;br /&gt;
&lt;br /&gt;
==Android Forensic Techniques on Ubuntu Using ADB==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;What is ADB?&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Android Debug Bridge (ADB) is a powerful command-line tool used to communicate with an Android device connected to a computer. In the context of forensics, ADB allows us to extract data, execute commands on the device, and analyze the system in depth.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Preparation&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
1. &amp;#039;&amp;#039;&amp;#039;Installing ADB:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;SDK Platform-tools Method:&amp;#039;&amp;#039;&amp;#039; Download the platform-tools from the official Android developer site and extract it to your desired directory. Add the path to this directory to the PATH environment variable.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;SDK Manager Method:&amp;#039;&amp;#039;&amp;#039; If you have already installed Android Studio, you can use the SDK Manager to install the platform-tools.&lt;br /&gt;
2. &amp;#039;&amp;#039;&amp;#039;Enable USB Debugging:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* Open the settings on your Android device.&lt;br /&gt;
* Look for the &amp;quot;Developer Options&amp;quot; (usually hidden; enable it by tapping &amp;quot;Build Number&amp;quot; several times).&lt;br /&gt;
* Enable &amp;quot;USB Debugging&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==ADB Commands and Usage Examples==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb devices:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; Displays a list of Android devices connected to the computer.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Example:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 adb devices  &lt;br /&gt;
 List of devices attached  &lt;br /&gt;
 emulator-5554   device&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb shell:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; Opens a shell on the Android device, allowing you to run commands directly on the operating system.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Example:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 adb shell  &lt;br /&gt;
 # Once in the shell, you can run Linux commands like ls, cd, cat, etc.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb pull:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; Copies files from the Android device to the computer.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Example:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 adb pull /sdcard/Documents/file.txt ~/Downloads&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb push:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; Copies files from the computer to the Android device.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Example:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 adb push ~/tools/myapp.apk /sdcard/&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb shell screencap -p /sdcard/screenshot.png:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; Takes a screenshot of the device and saves it as a PNG file in internal storage.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Example:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 adb shell screencap -p /sdcard/screenshot.png  &lt;br /&gt;
 adb pull /sdcard/screenshot.png ./&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb logcat:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; Prints the Android system logs to the terminal. Very useful for tracing application activity, errors, and other information.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Example:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 adb logcat &amp;gt; log.txt&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb install myapp.apk:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; Installs an APK application on the device.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Example:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 adb install myapp.apk&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb shell dumpsys meminfo:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; Displays memory usage information on the device.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Example:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 adb shell dumpsys meminfo &amp;gt; meminfo.txt&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb analyze database:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; To analyze databases on the device, you need to use additional tools like SQLite Browser or SQLite command-line tools.&lt;br /&gt;
&lt;br /&gt;
 adb pull /data/data/com.example.app/databases/mydatabase.db .  &lt;br /&gt;
 sqlite3 mydatabase.db&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb analyze malware:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; Requires specialized tools such as VirusTotal, Cuckoo Sandbox, or other malware analysis frameworks. You need to extract suspicious files and analyze them using those tools.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;adb analyze RAT:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Function:&amp;#039;&amp;#039;&amp;#039; To detect and analyze RATs, you need to check system logs, network activity, and configuration files related to RATs. Tools like Wireshark can help in network analysis.&lt;br /&gt;
&lt;br /&gt;
==Case Example and Analysis Steps==&lt;br /&gt;
&lt;br /&gt;
For example, you want to analyze an application suspected of being malware. The steps that can be taken:&lt;br /&gt;
&lt;br /&gt;
 1. &amp;#039;&amp;#039;&amp;#039;Connect the device:&amp;#039;&amp;#039;&amp;#039; Connect the Android device to the computer and ensure USB debugging is enabled.&lt;br /&gt;
 2. &amp;#039;&amp;#039;&amp;#039;Extract the application:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 adb pull /data/app/com.example.malware-1.apk .&lt;br /&gt;
&lt;br /&gt;
 3. &amp;#039;&amp;#039;&amp;#039;Static analysis:&amp;#039;&amp;#039;&amp;#039; Use decompilation tools like jadx to view the application&amp;#039;s source code.&lt;br /&gt;
 4. &amp;#039;&amp;#039;&amp;#039;Dynamic analysis:&amp;#039;&amp;#039;&amp;#039; Run the application on a virtual or physical device, then monitor its activity using logcat and network analysis tools.&lt;br /&gt;
 5. &amp;#039;&amp;#039;&amp;#039;Look for indicators of compromise:&amp;#039;&amp;#039;&amp;#039; Note any unusual permissions, suspicious network connections, and abnormal application behavior.&lt;br /&gt;
 6. &amp;#039;&amp;#039;&amp;#039;Malware analysis:&amp;#039;&amp;#039;&amp;#039; Upload the APK to VirusTotal for an analysis report.&lt;br /&gt;
&lt;br /&gt;
==Notes:==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Root Access:&amp;#039;&amp;#039;&amp;#039; For deeper access, you may need to root the device.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Data Protection:&amp;#039;&amp;#039;&amp;#039; Always follow the law and ethics when performing digital forensics. Do not access data without permission.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Additional Tools:&amp;#039;&amp;#039;&amp;#039; Besides ADB, there are many specialized Android forensic tools that can assist in more complex analyses.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
ADB is an invaluable tool for digital forensic investigators. With a good understanding of ADB commands and supporting tools, you can conduct in-depth analysis on Android devices to uncover relevant digital evidence.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Disclaimer:&amp;#039;&amp;#039;&amp;#039; This information is for educational purposes only and should not be used for illegal activities.&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [[Forensic: IT]]&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>